Detection and Response with XDR Integrated Security Solutions to Combat Emerging Threats
大小880.35 MB
文件数130
Info Hash:9296D84D585166BCE84D7EE06F76C7E9C7EF3987
收录时间2025-12-16 06:01:57
更新时间2025-12-21 02:56:09
文件列表 (130)
Module 3 XDR with Cisco/Lesson 8 Investigating an Incident/002. 8.1 Describe an Incident in XDR.mp4
85.27 MB
Introduction/001. Detection and Response with XDR Introduction.mp4
26.33 MB
Module 1 Security Operations and Tooling/001. Module Introduction.en.srt
1.43 KB
Module 1 Security Operations and Tooling/001. Module Introduction.mp4
9.04 MB
Module 1 Security Operations and Tooling/Lesson 1 The Modern Security Operations Center/001. Learning objectives.en.srt
497 B
Module 1 Security Operations and Tooling/Lesson 1 The Modern Security Operations Center/001. Learning objectives.mp4
4 MB
Module 1 Security Operations and Tooling/Lesson 1 The Modern Security Operations Center/002. 1.1 Describe the Goals of the SOC.en.srt
1.87 KB
Module 1 Security Operations and Tooling/Lesson 1 The Modern Security Operations Center/002. 1.1 Describe the Goals of the SOC.mp4
4.61 MB
Module 1 Security Operations and Tooling/Lesson 1 The Modern Security Operations Center/003. 1.2 Describe SOC Organization.en.srt
1.21 KB
Module 1 Security Operations and Tooling/Lesson 1 The Modern Security Operations Center/003. 1.2 Describe SOC Organization.mp4
3.16 MB
Module 1 Security Operations and Tooling/Lesson 1 The Modern Security Operations Center/004. 1.3 Describe SOC Roles and Responsibilities.en.srt
5.23 KB
Module 1 Security Operations and Tooling/Lesson 1 The Modern Security Operations Center/004. 1.3 Describe SOC Roles and Responsibilities.mp4
12.43 MB
Module 1 Security Operations and Tooling/Lesson 1 The Modern Security Operations Center/005. 1.4 Describe SOC Process Flow.en.srt
2.79 KB
Module 1 Security Operations and Tooling/Lesson 1 The Modern Security Operations Center/005. 1.4 Describe SOC Process Flow.mp4
7.09 MB
Module 1 Security Operations and Tooling/Lesson 2 Security Operations Concepts and Tooling/001. Learning objectives.en.srt
660 B
Module 1 Security Operations and Tooling/Lesson 2 Security Operations Concepts and Tooling/001. Learning objectives.mp4
4.71 MB
Module 1 Security Operations and Tooling/Lesson 2 Security Operations Concepts and Tooling/002. 2.1 Describe Basics of NIST Cybersecurity Framework (CSF).en.srt
4.39 KB
Module 1 Security Operations and Tooling/Lesson 2 Security Operations Concepts and Tooling/002. 2.1 Describe Basics of NIST Cybersecurity Framework (CSF).mp4
10.04 MB
Module 1 Security Operations and Tooling/Lesson 2 Security Operations Concepts and Tooling/003. 2.2 Describe Major Categories of Threats.en.srt
2.73 KB
Module 1 Security Operations and Tooling/Lesson 2 Security Operations Concepts and Tooling/003. 2.2 Describe Major Categories of Threats.mp4
8.8 MB
Module 1 Security Operations and Tooling/Lesson 2 Security Operations Concepts and Tooling/004. 2.3 Describe Major Categories of Controls.en.srt
3.82 KB
Module 1 Security Operations and Tooling/Lesson 2 Security Operations Concepts and Tooling/004. 2.3 Describe Major Categories of Controls.mp4
10.13 MB
Module 1 Security Operations and Tooling/Lesson 2 Security Operations Concepts and Tooling/005. 2.4 Identify Some Popular Open-Source Tools and Their Functions.en.srt
2.1 KB
Module 1 Security Operations and Tooling/Lesson 2 Security Operations Concepts and Tooling/005. 2.4 Identify Some Popular Open-Source Tools and Their Functions.mp4
5.07 MB
Module 1 Security Operations and Tooling/Lesson 3 Computer Security Incident Response Teams (CSIRT)/001. Learning objectives.en.srt
644 B
Module 1 Security Operations and Tooling/Lesson 3 Computer Security Incident Response Teams (CSIRT)/001. Learning objectives.mp4
4.44 MB
Module 1 Security Operations and Tooling/Lesson 3 Computer Security Incident Response Teams (CSIRT)/002. 3.1 Describe the Goals of a CSIRT.en.srt
1.75 KB
Module 1 Security Operations and Tooling/Lesson 3 Computer Security Incident Response Teams (CSIRT)/002. 3.1 Describe the Goals of a CSIRT.mp4
5.43 MB
Module 1 Security Operations and Tooling/Lesson 3 Computer Security Incident Response Teams (CSIRT)/003. 3.2 Appreciate the Differences Between a SOC and a CSIRT.en.srt
1.31 KB
Module 1 Security Operations and Tooling/Lesson 3 Computer Security Incident Response Teams (CSIRT)/003. 3.2 Appreciate the Differences Between a SOC and a CSIRT.mp4
4.18 MB
Module 2 Extended Detection and Response (XDR)/001. Module Introduction.en.srt
1.13 KB
Module 2 Extended Detection and Response (XDR)/001. Module Introduction.mp4
4.08 MB
Module 2 Extended Detection and Response (XDR)/Lesson 4 Trends and Challenges/001. Learning objectives.en.srt
476 B
Module 2 Extended Detection and Response (XDR)/Lesson 4 Trends and Challenges/001. Learning objectives.mp4
1.97 MB
Module 2 Extended Detection and Response (XDR)/Lesson 4 Trends and Challenges/002. 4.1 Describe the Limitations of Existing Solutions.en.srt
9.09 KB
Module 2 Extended Detection and Response (XDR)/Lesson 4 Trends and Challenges/002. 4.1 Describe the Limitations of Existing Solutions.mp4
16.56 MB
Module 2 Extended Detection and Response (XDR)/Lesson 4 Trends and Challenges/003. 4.2 Identify Some of the Top Roadblocks with Existing Tools.en.srt
6.67 KB
Module 2 Extended Detection and Response (XDR)/Lesson 4 Trends and Challenges/003. 4.2 Identify Some of the Top Roadblocks with Existing Tools.mp4
11.64 MB
Module 2 Extended Detection and Response (XDR)/Lesson 4 Trends and Challenges/004. 4.3 Describe the Limitations with SIEMs.en.srt
4.01 KB
Module 2 Extended Detection and Response (XDR)/Lesson 4 Trends and Challenges/004. 4.3 Describe the Limitations with SIEMs.mp4
7.16 MB
Module 2 Extended Detection and Response (XDR)/Lesson 4 Trends and Challenges/005. 4.4 Describe the Limitations with SOARs.en.srt
2.67 KB
Module 2 Extended Detection and Response (XDR)/Lesson 4 Trends and Challenges/005. 4.4 Describe the Limitations with SOARs.mp4